Courses
Home > Courses

Certified Network Defender

Certified Network Defender (CND ) is a vendor-neutral,hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cyber security education framework presented by the National Initiative of Cyber security Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.

Read More

Certified Ethical Hacker

Certified Ethical Hacking Certification

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

Read More

Forensic Investigator

Computer Hacking Forensic Investigator Certification

The CHFI v8 Program certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

Read More

Certified Chief Information Security Officer

Certified CISO Body of Knowledge

The EC-Council CCISO Body of Knowledge covers all five the CCISO Information Security Management Domains in depth and was written by seasoned CISOs for current and aspiring CISOs.  Domain 1 covers the Policy, Legal, and Compliance aspects of Governance. Domain 2 delves into the all-important topic of audit management from the CISO’s perspective and also covers IS controls.  Domain 3 covers the Role of the CISO from a Project and Operations Management perspective.  Domain 4 summarizes the technical aspects that CISOs manage in their day-to-day jobs, but from an executive standpoint.  Domain 5 is all about Strategic Planning and Finance – crucial areas for C-Level executives to understand in order to succeed and drive information security throughout their organizations.

Read More

Security Analyst

EC-COUNCIL CERTIFIED SECURITY ANALYST (ECSA)

You are an ethical hacker. In fact, you are a Certified Ethical Hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep. You have sufficient knowledge and an arsenal of hacking tools and you are also proficient in writing custom hacking code.

Read More

Certified Secure Programmer .NET

EC-COUNCIL
CERTIFIED SECURE PROGRAMMER (ECSP)

Software defects, bugs, and flaws in the logic of a program are consistently the cause for software vulnerabilities. Analysis by software security professionals has proven that most vulnerabilities are due to errors in programming. Hence, it has become crucial for organizations to educate their software developers about secure coding practices.

Read More

Certified Secure Programmer JAVA

C-COUNCIL
CERTIFIED SECURE PROGRAMMER (ECSP)

 

Software defects, bugs, and flaws in the logic of a program are consistently the cause for software vulnerabilities. Analysis by software security professionals has proven that most vulnerabilities are due to errors in programming. Hence, it has become crucial for organizations to educate their software developers about secure coding practices.

Read More

Network Security Administrator

The EC-Council Network Security Administrator

The ENSA certification verifies candidate’s network security skills and knowledge from a defensive perspective.

EC-Councils’ ENSA certification looks at network security in a defensive view while the CEH certification looks at the security in an offensive mode. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization’s information. Students will learn how to evaluate network and Internet security issues and design, as well as how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them.

Read More

Disaster Recovery Professional

EC-COUNCIL DISASTER RECOVERY PROFESSIONAL

The EDRP certification validates the candidate’s ability to plan, organize, and direct the testing of disaster response, recovery support, and business recovery procedures.

IT Disaster Recovery Course

Six years after the events of 9/11, many corporate IT operations are overconfident about their ability to handle a disaster, according to a Forrester Research, Inc. 2007 report.

Read More

Security Specialist

EC-COUNCIL CERTIFIED SECURITY SPECIALIST

EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics.

Read More

Incident Handler

EC-COUNCIL CERTIFIED INCIDENT HANDLER PROGRAM

The ECIH certification will provide professionals with greater industry acceptance as an incident handler, risk administrator, pen tester, forensic investigator, etc.

Read More

Secure Computer User

CERTIFIED SECURE
COMPUTER USER (CSCU)

Course Description:

The purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure.

About The Course

This course prepares an individual to sit for CSCU exam 112-12 This certification is an excellent complement to educational offerings in the domain of security and networking.

About the Program

Educational institutions can provide greater value to students by providing them not only with one of the most updated courses available today, but also a certification that empowers students in the corporate world.

Read More

Advanced Network Defense

Advanced Network Defense
(CAST 614)

 

Come experience a comprehensively structured and fast paced program that immerses you into world of an ethical hacker, providing insights of their mindset; a critical weapon for defending against some of the most malicious attacks around.

Course Description
With this course you can be among the few who transcend the old idea of the hacker having all the fun, take pride being the defender, form an offensive mindset to skillfully orchestrate robust and solid defenses and reinvent popular belief by beating the hacker at his own game.

Read More

Advanced Hacking Hardening Corporate Web Apps

Hacking and Hardening Corporate Web App/Web Site

A well thought out course designed with the average security unaware programmer in mind. Your developers will be astonished at the things they do every day that turn out to have security flaws in them. To drive the point home, the course is designed with more than 50% involving hands-on coding labs. The ideal participant should have a development background, coding or architecting background either currently or previously. The candidate currently could be a developer trying to raise his or her cyber awareness. Or the Candidate may either now or have moved into a managerial position perhaps making them even more responsible for any security breach. In today’s world, there is not one day that goes by that the national evening news mentions a break in. While that may not seem that ground breaking in and of itself, the truth of the matter is much more staggering. Studies have not only shown but have proven that for every record compromised it can cost the company well over a $1000 in costs to repair. Those costs may be hard $ costs as well as costs of reputation. So if 10, 000 records were compromised… Well do the math! This can be not only a job limiting oversight but a career limiting one as well. And every manager knows after Sarbanes Oxley the finger points back to the man in charge.

Read More

Advanced Mobile Hacking & Forensics

About CAST 612

Digital Mobile Forensics is fast becoming a lucrative and constantly evolving field, this is no surprise as the mobile phone industry has been witnessing some unimaginable growth, some experts say it may even replace the Computer for those only wishing to send and receive emails. As this area of digital forensics grow in scope and size due to the prevalence and proliferation of mobile devices and as the use of these devices grows, more evidence and information important to investigations will be found on them. To ignore examining these devices would be negligent and result in incomplete investigations. This growth has now presented new and growing career opportunities for interested practitioners in corporate, enforcement, and military settings. Mobile forensics is certainly here to stay as every mobile device is different and different results will occur based on that device requiring unique expertise.

Read More

Advanced Securing Windows INfrastructure

Securing Windows Infrastructure

This 3 day technical course focuses on the key aspects of Windows Infrastructure Security, applying best practices to secure interconnected information systems within your organization providing a holistically reliable framework to support an entire enterprise structure.

Read More

Encription Specialist

EC-Council Certified Encryption Specialist (ECES)

Course Description

The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES. Other topics introduced:

Read More

Network Defense Architect

AGE REQUIREMENTS AND POLICIES CONCERNING MINORS

The age requirement for attending the training or attempting this exam is restricted to any candidate that is at least 18 years old.

Read More

Licensed Penetration tester

The EC-Council Licensed Penetration Tester (Master) Credential

To earn the prestigious EC-Council LPT (Master) Credential, you must successfully pass our most challenging practical exam available. The LPT (Master) practical exam is the capstone to EC-Council’s entire information security track; from the Certified Ethical Hacker Program (C|EH) to theEC-Council Certified Security Analyst (E|CSA) Program. It all culminates with the ultimate test of your career as a penetration tester – the Licensed Penetration Tester practical exam.

Read More

Advanced Penetration Testing

The sample methodology:
  • Information gathering and OSINT
  • Scanning Building a Target Database
  • Enumeration
  • Vulnerability Analysis
  • Exploitation
  • Post exploitation
  • Advanced techniques
  • Data Analysis
  • Report
Read More